Skip to main content

Symmetric Key Based Authentication Mechanism for Secure Communication in MANETs

  • Conference paper
  • First Online:
Intelligent Communication and Computational Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 19))

Abstract

In MANETs, secure communication is very difficult to achieve because its nature-like communication medium is open wireless which can be easily accessed by anyone who comes in the radio range of the communicating devices, nodes are physically vulnerable, less-efficient (processing power, memory) communicating devices, the absence of central authority, free from the constraint of topological structure of network, etc. In last decade, applications of MANETs are increasing rapidly. Most of the application demands the secure communication of information. In this work, symmetric key based authentication mechanism has been proposed to ensure the secure communication between the communicating parties. The proposed model secures the network from the well known and frequently occurred attacks (impersonation, modifies routing information, black hole). In this work, two levels of authentication have been used, first level for hop-to-hop authentication (MD5 algorithm has been used for authentication code generation) and second level for end-to-end authentication (SHA1 algorithm has for authentication code generation). For the simulation purpose, AODV protocol is used for checking the effectiveness of the proposed model and PDR; AE2ED and TP are used to measure the performance of the proposed, AODV and existing models in the absence and presence of the malicious nodes. NS2.35 on Ubuntu 12.04 LTS with 4 GB RAM is used for simulation. Simulation results show the advantage of proposed model over the original AODV and some related models published recently. A result showing our model implements the security scheme with less overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. N. Sharma, A Gupta, SS Rajput and V. Yadav, “ Congestion Control Technique in MANET: A Survey” 2nd IEEE International Conference on CICT, pp. 280–282, Feb. 2016.

    Google Scholar 

  2. S. S. Rajput, V. Kumar and S. K. Paul, “Comparative Analysis of Random Early Detection (RED) and Virtual Output Queue (VOQ) in Differential Service Networks” IEEE International Conference on SPIN, pp. 281–285, Feb 2014.

    Google Scholar 

  3. S. S. Rajput, V. Kumar and K. Dubey, “Comparative Analysis of AODV and AODV-DOR routing protocol in MANET” International Journal of Computer Application, vol. 63, no. 22, pp. 19–24, Feb 2013.

    Google Scholar 

  4. D. Djenouri et al. “A survey of security issues in mobile ad hoc networks” IEEE Communications Surveys & Tutorials. Fourth Quarter 2005.

    Google Scholar 

  5. M. Charvalho, “Security in Mobile Ad hoc Networks” Published by the IEEE Computer S ociety, pp:72–75, 2008.

    Google Scholar 

  6. William Stalling, Cryptography and Network Security, 4th Ed. Pearson Education, India, 2006.

    Google Scholar 

  7. B. A. Forouzan, Cryptography and Network Security, 2nd Ed., Tata McGraw-Hill Higher Education, India, 2008.

    Google Scholar 

  8. K. V. Arya and S. S. Rajput, “Securing AODV routing protocol in MANET using NMAC with HBKS Technique,” IEEE International Conference on SPIN, pp. 281–285, Feb 2014.

    Google Scholar 

  9. P. Sachan and P. M. Khilar, “Securing AODV routing protocol in MANET based on cryptographic authentication mechanism,” International Journal of Network Security and Its Applications (IJNSA), vol. 3, no. 5, 2011.

    Google Scholar 

  10. S. S. Rajput and M. C. Trivedi, “Securing ZRP routing protocol in MANET using Authentication Technique,” IEEE International Conference on CICN, pp. 872–877, Nov. 2014.

    Google Scholar 

  11. E. H. T. Issariyakul, “Introduction to Network Simulator NS2,” Springer Science and Business Media, NY, USA, 2009.

    Google Scholar 

  12. C. Perkins, E. Beldingroyer, and S. Das, “AODV RFC 3561,” Internet Engineering Task Force (IETF), 2003. Available at http://datatracker.ietf.org/doc/rfc3561/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sachin Malhotra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte. Ltd.

About this paper

Cite this paper

Malhotra, S., Trivedi, M.C. (2018). Symmetric Key Based Authentication Mechanism for Secure Communication in MANETs. In: Hu, YC., Tiwari, S., Mishra, K., Trivedi, M. (eds) Intelligent Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 19. Springer, Singapore. https://doi.org/10.1007/978-981-10-5523-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5523-2_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5522-5

  • Online ISBN: 978-981-10-5523-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics